svn:r2989
@@ -227,10 +227,3 @@ the message.
If you ask for lots of events, and 16MB of them queue up on the buffer,
the Tor process will close the socket.
------------
-(for emacs)
- Local Variables:
- mode:text
- indent-tabs-mode:nil
- fill-column:77
- End:
@@ -809,10 +809,3 @@ A.1. Differences between spec and implementation
addresses in their exit policies. The current codebase has no IPv6
support at all.
@@ -810,10 +810,3 @@ void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr, const u8 pt[16], u8 c
PUTU32(ct + 12, s3);
}
-/*
- mode:c
- c-basic-offset:2
-*/
@@ -27,10 +27,3 @@ void aes_adjust_counter(aes_cnt_cipher_t *cipher, long delta);
#endif
@@ -672,10 +672,3 @@ const char *tor_socket_strerror(int e)
return strerror(e);
@@ -183,10 +183,3 @@ void tor_mutex_free(tor_mutex_t *m);
@@ -617,10 +617,3 @@ int strmap_isempty(strmap_t *map)
return SPLAY_EMPTY(&map->head);
@@ -90,11 +90,3 @@ void strmap_iter_get(strmap_iter_t *iter, const char **keyp, void **valp);
int strmap_iter_done(strmap_iter_t *iter);
-
@@ -1614,10 +1614,3 @@ secret_to_key(char *key_out, size_t key_out_len, const char *secret,
crypto_free_digest_env(d);
@@ -159,10 +159,3 @@ void secret_to_key(char *key_out, size_t key_out_len, const char *secret,
@@ -109,10 +109,3 @@ tor_poll(struct pollfd *ufds, unsigned int nfds, int timeout)
@@ -47,10 +47,3 @@ int tor_poll(struct pollfd *ufds, unsigned int nfds, int timeout);
@@ -452,10 +452,3 @@ void switch_logs_debug(void)
@@ -99,10 +99,3 @@ void _log_fn(int severity, const char *format, ...);
# define __LOG_H
@@ -134,10 +134,3 @@ extern int have_failed;
@@ -223,10 +223,3 @@ tor_gzip_uncompress(char **out, size_t *out_len,
return -1;
@@ -233,10 +233,3 @@ typedef uint32_t uintptr_t;
#endif /* __TORINT_H */
@@ -810,10 +810,3 @@ void _assert_no_tls_errors(const char *fname, int line)
tor_assert(0);
@@ -47,10 +47,3 @@ void _assert_no_tls_errors(const char *fname, int line);
@@ -1362,10 +1362,3 @@ void write_pidfile(char *filename) {
@@ -115,10 +115,3 @@ void finish_daemon(void);
void write_pidfile(char *filename);
@@ -690,10 +690,3 @@ void assert_buf_ok(buf_t *buf)
tor_assert(buf->datalen <= buf->len);
@@ -1240,10 +1240,3 @@ onion_extend_cpath(crypt_path_t **head_ptr, cpath_build_state_t
return 0;
@@ -503,10 +503,3 @@ void assert_circuit_ok(const circuit_t *c)
@@ -866,10 +866,3 @@ int connection_ap_handshake_attach_circuit(connection_t *conn) {
@@ -299,10 +299,3 @@ static void command_process_destroy_cell(cell_t *cell, connection_t *conn) {
@@ -2334,10 +2334,3 @@ config_parse_interval(const char *s, int *ok) {
return (int)r;
@@ -1518,10 +1518,3 @@ void assert_connection_ok(connection_t *conn, time_t now)
@@ -1211,10 +1211,3 @@ set_exit_redirects(smartlist_t *lst)
redirect_exit_list = lst;
@@ -499,10 +499,3 @@ loop:
goto loop; /* process the remainder of the buffer */
@@ -604,10 +604,3 @@ init_cookie_authentication(int enabled)
- Local Variabls:
@@ -379,10 +379,3 @@ int assign_to_cpuworker(connection_t *cpuworker, unsigned char question_type,
@@ -993,10 +993,3 @@ int connection_dir_finished_connecting(connection_t *conn)
@@ -935,10 +935,3 @@ size_t dirserv_get_runningrouters(const char **rr, int compress)
return compress ? the_runningrouters_z_len : the_runningrouters_len;
@@ -792,10 +792,3 @@ static void spawn_enough_dnsworkers(void) {
@@ -1373,10 +1373,3 @@ int tor_main(int argc, char *argv[]) {
@@ -315,10 +315,3 @@ onion_skin_client_handshake(crypto_dh_env_t *handshake_state,
@@ -1643,10 +1643,3 @@ int tor_version_compare(tor_version_t *a, tor_version_t *b);
@@ -466,10 +466,3 @@ failed:
@@ -339,10 +339,3 @@ void rend_process_relay_cell(circuit_t *circ, int command, size_t length,
@@ -287,10 +287,3 @@ rend_mid_rendezvous(circuit_t *circ, const char *request, size_t request_len)
@@ -992,10 +992,3 @@ rend_service_set_connection_addr_port(connection_t *conn, circuit_t *circ)
@@ -616,10 +616,3 @@ rep_hist_get_bandwidth_lines(void)
return buf;
@@ -832,10 +832,3 @@ int is_legal_nickname_or_hexdigest(const char *s)
return len == HEX_DIGEST_LEN+1 && strspn(s+1,HEX_CHARACTERS)==len-1;
@@ -1217,10 +1217,3 @@ void clear_trusted_dir_servers(void)
@@ -1517,10 +1517,3 @@ int tor_version_compare(tor_version_t *a, tor_version_t *b)
@@ -1253,10 +1253,3 @@ main(int c, char**v) {
@@ -17,10 +17,3 @@ int main(int argc, char *argv[])
return tor_main(argc, argv);